Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:13433
[Eng]
Version
14
Class
patch
ALTXid
27442
Language
Russian
Severity
High
Title
Обновление USN-1093-1 -- уязвимости linux-mvl-dove
Description
Joel Becker discovered that OCFS2 did not correctly validate on-disk
symlink structures. If an attacker were able to trick a user or automated
system into mounting a specially crafted filesystem, it could crash the
system or exposde kernel memory, leading to a loss of privacy.
Family
unix
Platform
Ubuntu 10.04
Ubuntu 10.10
Product
linux-mvl-dove
Reference
VENDOR: USN-1093-1
VENDOR: USN-1093-1
Id:
USN-1093-1
Reference:
https://usn.ubuntu.com/usn/usn-1093-1
CVE: CVE-2010-4077
CVE: CVE-2010-4077
Id:
CVE-2010-4077
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4077
Comment
: The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[linux-kernel] 20100915 [PATCH] drivers/char/nozomi.c: prevent reading uninitialized stackmemory (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648663 (CONFIRM)
45059 (BID)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
8129 (SREASON)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862 ()
CVE: CVE-2010-4076
CVE: CVE-2010-4076
Id:
CVE-2010-4076
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4076
Comment
: The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
[linux-kernel] 20100915 [PATCH] drivers/char/amiserial.c: prevent reading uninitialized stack memory (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648661 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862 ()
CVE: CVE-2011-1093
CVE: CVE-2011-1093
Id:
CVE-2011-1093
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093
Comment
: The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
46793 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=682954 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38 (CONFIRM)
[oss-security] 20110308 CVE request: kernel: dccp: fix oops on Reset after close (MLIST)
[oss-security] 20110308 Re: CVE request: kernel: dccp: fix oops on Reset after close (MLIST)
RHSA-2011:0833 (REDHAT)
http://downloads.avaya.com/css/P8/documents/100145416 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=720dc34bbbe9493c7bd48b2243058b4e447a929d (MISC)
CVE: CVE-2011-1082
CVE: CVE-2011-1082
Id:
CVE-2011-1082
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1082
Comment
: fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=681575 (CONFIRM)
[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38 (CONFIRM)
[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls. (MLIST)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e (MISC)
CVE: CVE-2011-1012
CVE: CVE-2011-1012
Id:
CVE-2011-1012
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1012
Comment
: The ldm_parse_vmdb function in fs/partitions/ldm.c in the Linux kernel before 2.6.38-rc6-git6 does not validate the VBLK size value in the VMDB structure in an LDM partition table, which allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted partition table.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
369 (Divide By Zero)
References:
[mm-commits] 20110222 + ldm-corrupted-partition-table-can-cause-kernel-oops.patch added to -mm tree (MLIST)
[oss-security] 20110223 CVE request: kernel: Corrupted LDM partition table issues (MLIST)
[oss-security] 20110223 Re: CVE request: kernel: Corrupted LDM partition table issues (MLIST)
http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt (MISC)
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git6.log (CONFIRM)
1025127 (SECTRACK)
46512 (BID)
8115 (SREASON)
USN-1146-1 (UBUNTU)
20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=294f6cf48666825d23c9372ef37631232746e40d (MISC)
CVE: CVE-2011-1010
CVE: CVE-2011-1010
Id:
CVE-2011-1010
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1010
Comment
: Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://bugzilla.redhat.com/show_bug.cgi?id=679282 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2 (CONFIRM)
[oss-security] 20110222 Re: CVE request: kernel: fs/partitions: validate map_count in mac partition tables (MLIST)
http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt (MISC)
[oss-security] 20110222 CVE request: kernel: fs/partitions: validate map_count in mac partition tables (MLIST)
[oss-security] 20110222 Re: CVE request: kernel: fs/partitions: validate map_count in mac partition tables (MLIST)
1025126 (SECTRACK)
46492 (BID)
8115 (SREASON)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-map-dos(65643) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed (MISC)
CVE: CVE-2011-0712
CVE: CVE-2011-0712
Id:
CVE-2011-0712
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712
Comment
: Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
[oss-security] 20110216 kernel: ALSA: caiaq - Fix possible string-buffer overflow (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2 (CONFIRM)
46419 (BID)
[oss-security] 20110216 Re: kernel: ALSA: caiaq - Fix possible string-buffer overflow (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=677881 (CONFIRM)
[oss-security] 20110216 Re: kernel: ALSA: caiaq - Fix possible string-buffer overflow (MLIST)
USN-1146-1 (UBUNTU)
kernel-usbdevice-bo(65461) (XF)
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581 (MISC)
CVE: CVE-2011-0521
CVE: CVE-2011-0521
Id:
CVE-2011-0521
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0521
Comment
: The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2 (CONFIRM)
[oss-security] 20110125 Re: Linux kernel av7110 negative array offset (MLIST)
43009 (SECUNIA)
[oss-security] 20110125 Linux kernel av7110 negative array offset (MLIST)
45986 (BID)
1025195 (SECTRACK)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-av7110ca-privilege-escalation(64988) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644 (MISC)
CVE: CVE-2011-0006
CVE: CVE-2011-0006
Id:
CVE-2011-0006
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0006
Comment
: The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:P/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=667912 (CONFIRM)
[oss-security] 20110106 Re: CVE Request: kernel [Re: Security review of 2.6.32.28] (MLIST)
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=867c20265459d30a01b021a9c1e81fb4c5832aa9 (MISC)
CVE: CVE-2010-4656
CVE: CVE-2010-4656
Id:
CVE-2010-4656
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4656
Comment
: The iowarrior_write function in drivers/usb/misc/iowarrior.c in the Linux kernel before 2.6.37 does not properly allocate memory, which might allow local users to trigger a heap-based buffer overflow, and consequently cause a denial of service or gain privileges, via a long report.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
787 (Out-of-bounds Write)
References:
[oss-security] 20110125 Re: CVE request: linux kernel heap issues (MLIST)
[oss-security] 20110124 Re: CVE request: linux kernel heap issues (MLIST)
46069 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=672420 (CONFIRM)
[oss-security] 20110124 CVE request: linux kernel heap issues (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
USN-1146-1 (UBUNTU)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3ed780117dbe5acb64280d218f0347f238dafed0 (MISC)
CVE: CVE-2010-4655
CVE: CVE-2010-4655
Id:
CVE-2010-4655
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4655
Comment
: net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
665 (Improper Initialization)
References:
[oss-security] 20110124 CVE request: linux kernel heap issues (MLIST)
[linux-kernel] 20101007 [PATCH] net: clear heap allocations for privileged ethtool actions (MLIST)
[oss-security] 20110125 Re: CVE request: linux kernel heap issues (MLIST)
[oss-security] 20110124 Re: CVE request: linux kernel heap issues (MLIST)
[oss-security] 20110125 Re: CVE request: linux kernel heap issues (MLIST)
45972 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=672428 (CONFIRM)
[oss-security] 20110128 Re: CVE request: linux kernel heap issues (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
USN-1146-1 (UBUNTU)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b00916b189d13a615ff05c9242201135992fcda3 (MISC)
CVE: CVE-2010-4650
CVE: CVE-2010-4650
Id:
CVE-2010-4650
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4650
Comment
: Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=667892 (CONFIRM)
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
[oss-security] 20110106 Re: CVE Request: kernel [Re: Security review of 2.6.32.28] (MLIST)
https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7572777eef78ebdee1ecb7c258c0ef94d35bad16 (MISC)
CVE: CVE-2011-1044
CVE: CVE-2011-1044
Id:
CVE-2011-1044
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1044
Comment
: The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=667916 (CONFIRM)
46488 (BID)
RHSA-2011:0927 (REDHAT)
kernel-ibuverbspollcq-info-disclosure(65563) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93 ()
CVE: CVE-2010-4649
CVE: CVE-2010-4649
Id:
CVE-2010-4649
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649
Comment
: Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
46073 (BID)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=667916 (CONFIRM)
RHSA-2011:0927 (REDHAT)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93 (MISC)
CVE: CVE-2010-4648
CVE: CVE-2010-4648
Id:
CVE-2010-4648
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4648
Comment
: The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames.
CVSSv2 Score:
3.3
Access vector:
ADJACENT_NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:L/Au:N/C:P/I:N/A:N
References:
[oss-security] 20110106 Re: CVE Request: kernel [Re: Security review of 2.6.32.28] (MLIST)
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=667907 (CONFIRM)
https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0a54917c3fc295cb61f3fb52373c173fd3b69f48 (MISC)
CVE: CVE-2010-4527
CVE: CVE-2010-4527
Id:
CVE-2010-4527
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527
Comment
: The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
[oss-security] 20101230 CVE request: kernel: buffer overflow in OSS load_mixer_volumes (MLIST)
45629 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=667615 (CONFIRM)
http://xorl.wordpress.com/2011/01/09/cve-2010-4527-linux-kernel-oss-sound-card-driver-buffer-overflow/ (MISC)
[oss-security] 20101231 Re: CVE request: kernel: buffer overflow in OSS load_mixer_volumes (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
42765 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb (MISC)
CVE: CVE-2010-4526
CVE: CVE-2010-4526
Id:
CVE-2010-4526
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4526
Comment
: Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
CVSSv2 Score:
7.1
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
[oss-security] 20110104 Re: CVE-2010-4526 kernel: sctp: a race between ICMP protocol unreachable and connect() (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526 (CONFIRM)
[oss-security] 20110104 CVE-2010-4526 kernel: sctp: a race between ICMP protocol unreachable and connect() (MLIST)
RHSA-2011:0163 (REDHAT)
45661 (BID)
42964 (SECUNIA)
ADV-2011-0169 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-icmp-message-dos(64616) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819 (MISC)
CVE: CVE-2010-4346
CVE: CVE-2010-4346
Id:
CVE-2010-4346
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346
Comment
: The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CWE:
476 (NULL Pointer Dereference)
References:
[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.] (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6 (CONFIRM)
42570 (SECUNIA)
[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check (MLIST)
[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check. (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=662189 (CONFIRM)
[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check (MLIST)
[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.] (MLIST)
45323 (BID)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050 (MISC)
CVE: CVE-2010-4343
CVE: CVE-2010-4343
Id:
CVE-2010-4343
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4343
Comment
: drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
665 (Improper Initialization)
References:
[oss-security] 20101208 CVE request: kernel: bfa driver sysfs crash (MLIST)
[linux-scsi] 20100521 [PATCH 1/2] bfa: fix system crash when reading sysfs fc_host statistics (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=661182 (CONFIRM)
[oss-security] 20101209 Re: CVE request: kernel: bfa driver sysfs crash (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35 (CONFIRM)
45262 (BID)
RHSA-2011:0017 (REDHAT)
42884 (SECUNIA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7873ca4e4401f0ecd8868bf1543113467e6bae61 (MISC)
CVE: CVE-2010-4258
CVE: CVE-2010-4258
Id:
CVE-2010-4258
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258
Comment
: The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
269 (Improper Privilege Management)
References:
[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
20101207 Linux kernel exploit (FULLDISC)
[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=659567 (CONFIRM)
[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS. (MLIST)
http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/ (MISC)
[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path (MLIST)
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS. (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
ADV-2011-0213 (VUPEN)
SUSE-SA:2011:005 (SUSE)
43056 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html (CONFIRM)
http://code.google.com/p/chromium-os/issues/detail?id=10234 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177 (MISC)
CVE: CVE-2010-4249
CVE: CVE-2010-4249
Id:
CVE-2010-4249
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4249
Comment
: The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
[oss-security] 20101124 CVE request: kernel: unix socket local dos (MLIST)
[oss-security] 20101124 Re: CVE request: kernel: unix socket local dos (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2 (CONFIRM)
[netdev] 20101124 [PATCH] af_unix: limit unix_tot_inflight (MLIST)
45037 (BID)
[linux-kernel] 20101124 [PATCH net-next-2.6] scm: lower SCM_MAX_FD (MLIST)
[linux-kernel] 20101125 Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :( (MLIST)
15622 (EXPLOIT-DB)
https://bugzilla.redhat.com/show_bug.cgi?id=656756 (CONFIRM)
[linux-kernel] 20101123 Unix socket local DOS (OOM) (MLIST)
42354 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
RHSA-2011:0162 (REDHAT)
42963 (SECUNIA)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b (MISC)
CVE: CVE-2010-4248
CVE: CVE-2010-4248
Id:
CVE-2010-4248
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248
Comment
: Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=656264 (CONFIRM)
[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec (MLIST)
45028 (BID)
RHSA-2011:0004 (REDHAT)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194 (MISC)
CVE: CVE-2010-4242
CVE: CVE-2010-4242
Id:
CVE-2010-4242
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4242
Comment
: The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.
CVSSv2 Score:
4
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:C
CWE:
CWE-Other ()
References:
http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/ (MISC)
http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773 (CONFIRM)
[linux-kernel] 20101007 Peculiar stuff in hci_ath3k/badness in hci_uart (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=641410 (CONFIRM)
RHSA-2011:0004 (REDHAT)
45014 (BID)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-hciuartttyopen-dos(64617) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
CVE: CVE-2010-4175
CVE: CVE-2010-4175
Id:
CVE-2010-4175
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4175
Comment
: Integer overflow in the rds_cmsg_rdma_args function (net/rds/rdma.c) in Linux kernel 2.6.35 allows local users to cause a denial of service (crash) and possibly trigger memory corruption via a crafted Reliable Datagram Sockets (RDS) request, a different vulnerability than CVE-2010-3865.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
189 (Numeric Errors)
References:
[oss-security] 20101117 CVE request: kernel: integer overflow in RDS (MLIST)
[oss-security] 20101118 Re: CVE request: kernel: integer overflow in RDS (MLIST)
[linux-netdev] 20101117 [PATCH] Integer overflow in RDS cmsg handling (MLIST)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
44921 (BID)
SUSE-SA:2011:004 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
kernel-rdscmsgrdmaargs-dos(64618) (XF)
CVE: CVE-2010-4169
CVE: CVE-2010-4169
Id:
CVE-2010-4169
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4169
Comment
: Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
416 (Use After Free)
References:
[oss-security] 20101115 CVE request: kernel: perf bug (MLIST)
44861 (BID)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
[oss-security] 20101115 Re: CVE request: kernel: perf bug (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=651671 (CONFIRM)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
kernel-perfeventmmap-dos(63316) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da (MISC)
CVE: CVE-2010-4165
CVE: CVE-2010-4165
Id:
CVE-2010-4165
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
Comment
: The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
369 (Divide By Zero)
References:
[netdev] 20101110 possible kernel oops from user MSS (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=652508 (CONFIRM)
69241 (OSVDB)
[oss-security] 20101112 CVE request: kernel: possible kernel oops from user MSS (MLIST)
[oss-security] 20101112 Re: CVE request: kernel: possible kernel oops from user MSS (MLIST)
[netdev] 20101110 Re: possible kernel oops from user MSS (MLIST)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
44830 (BID)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
8123 (SREASON)
8111 (SREASON)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2 (MISC)
CVE: CVE-2010-4164
CVE: CVE-2010-4164
Id:
CVE-2010-4164
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
Comment
: Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE:
191 (Integer Underflow (Wrap or Wraparound))
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101112 Re: CVE request: kernel: remote DoS in X.25 (MLIST)
[netdev] 20101111 [SECURITY] [PATCH] Prevent crashing when parsing bad X.25 (MLIST)
[oss-security] 20101111 CVE request: kernel: remote DoS in X.25 (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=652517 (CONFIRM)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
45055 (BID)
42932 (SECUNIA)
ADV-2011-0124 (VUPEN)
SUSE-SA:2011:004 (SUSE)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5ef41308f94dcbb3b7afc56cdef1c2ba53fa5d2f (MISC)
CVE: CVE-2010-4668
CVE: CVE-2010-4668
Id:
CVE-2010-4668
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4668
Comment
: The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
[oss-security] 20101130 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
[linux-kernel] 20101129 [PATCH] block: check for proper length of iov entries earlier in blk_rq_map_user_iov() (MLIST)
https://patchwork.kernel.org/patch/363282/ (CONFIRM)
[oss-security] 20101130 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc7 (CONFIRM)
[linux-kernel] 20101129 Re: [PATCH] block: check for proper length of iov entries earlier in blk_rq_map_user_iov() (MLIST)
[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
45660 (BID)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
linux-blkrqmapuseriov-dos(64496) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5478755616ae2ef1ce144dded589b62b2a50d575 ()
CVE: CVE-2010-4163
CVE: CVE-2010-4163
Id:
CVE-2010-4163
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163
Comment
: The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=652957 (CONFIRM)
[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer (MLIST)
[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
44793 (BID)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689 (MISC)
CVE: CVE-2010-4162
CVE: CVE-2010-4162
Id:
CVE-2010-4162
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162
Comment
: Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=652529 (CONFIRM)
[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
42745 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
42778 (SECUNIA)
44793 (BID)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
SUSE-SA:2010:060 (SUSE)
42932 (SECUNIA)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34 (MISC)
CVE: CVE-2010-4160
CVE: CVE-2010-4160
Id:
CVE-2010-4160
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4160
Comment
: Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows (MLIST)
[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows (MLIST)
[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows (MLIST)
[oss-security] 20101110 CVE request: kernel: L2TP send buffer allocation size overflows (MLIST)
[netdev] 20101031 [SECURITY] L2TP send buffer allocation size overflows (MLIST)
[oss-security] 20101110 Re: CVE request: kernel: L2TP send buffer allocation size overflows (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=651892 (CONFIRM)
[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows (MLIST)
[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size() (MLIST)
SUSE-SA:2011:002 (SUSE)
http://xorl.wordpress.com/2010/11/11/cve-2010-4160-linux-kernel-l2tp-integer-overflows/ (MISC)
ADV-2011-0012 (VUPEN)
44762 (BID)
42801 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0213 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
SUSE-SA:2011:005 (SUSE)
43056 (SECUNIA)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0 (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a (MISC)
CVE: CVE-2010-4158
CVE: CVE-2010-4158
Id:
CVE-2010-4158
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158
Comment
: The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
20101118 Re: Kernel 0-day (BUGTRAQ)
20101109 Kernel 0-day (BUGTRAQ)
44758 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=651698 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters (MLIST)
20101109 Kernel 0-day (FULLDISC)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
FEDORA-2010-18983 (FEDORA)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
RHSA-2011:0162 (REDHAT)
42963 (SECUNIA)
ADV-2011-0168 (VUPEN)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
42890 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb (MISC)
CVE: CVE-2010-4157
CVE: CVE-2010-4157
Id:
CVE-2010-4157
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157
Comment
: Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[linux-scsi] 20101008 [patch] gdth: integer overflow in ioctl (MLIST)
[oss-security] 20101108 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
44648 (BID)
[oss-security] 20101109 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=651147 (CONFIRM)
[oss-security] 20101109 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
[oss-security] 20101110 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1 (CONFIRM)
[oss-security] 20101108 CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
42778 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
ADV-2011-0024 (VUPEN)
SUSE-SA:2010:060 (SUSE)
42789 (SECUNIA)
42932 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4 (MISC)
CVE: CVE-2010-4083
CVE: CVE-2010-4083
Id:
CVE-2010-4083
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083
Comment
: The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648673 (CONFIRM)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[mm-commits] 20100923 + sys_semctl-fix-kernel-stack-leakage.patch added to -mm tree (MLIST)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
ADV-2011-0124 (VUPEN)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0024 (VUPEN)
42932 (SECUNIA)
43809 (BID)
42789 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56 ()
CVE: CVE-2010-4082
CVE: CVE-2010-4082
Id:
CVE-2010-4082
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4082
Comment
: The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648671 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5 (CONFIRM)
[linux-kernel] 20100915 [PATCH] drivers/video/via/ioctl.c: prevent reading uninitializedstack memory (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
43817 (BID)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca ()
CVE: CVE-2010-4081
CVE: CVE-2010-4081
Id:
CVE-2010-4081
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081
Comment
: The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6 (CONFIRM)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648670 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45063 (BID)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
RHSA-2011:0017 (REDHAT)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
ADV-2011-0298 (VUPEN)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
SUSE-SA:2011:007 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d ()
CVE: CVE-2010-4080
CVE: CVE-2010-4080
Id:
CVE-2010-4080
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4080
Comment
: The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=648669 (CONFIRM)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45063 (BID)
45058 (BID)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d ()
CVE: CVE-2010-4079
CVE: CVE-2010-4079
Id:
CVE-2010-4079
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4079
Comment
: The ivtvfb_ioctl function in drivers/media/video/ivtv/ivtvfb.c in the Linux kernel before 2.6.36-rc8 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=648666 (CONFIRM)
[linux-kernel] 20100915 [PATCH] drivers/media/video/ivtv/ivtvfb.c: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc8 (CONFIRM)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45062 (BID)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=405707985594169cfd0b1d97d29fcb4b4c6f2ac9 ()
CVE: CVE-2010-4075
CVE: CVE-2010-4075
Id:
CVE-2010-4075
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4075
Comment
: The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=648660 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1 (CONFIRM)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[linux-kernel] 20100915 [PATCH] drivers/serial/serial_core.c: prevent readinguninitialized stack memory (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
RHSA-2010:0958 (REDHAT)
43806 (BID)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
RHSA-2011:0007 (REDHAT)
42884 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0017 (REDHAT)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862 ()
CVE: CVE-2010-4073
CVE: CVE-2010-4073
Id:
CVE-2010-4073
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073
Comment
: The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1 (CONFIRM)
[linux-kernel] 20101006 [PATCH v3] IPC: Initialize structure memory to zero for compat functions (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648658 (CONFIRM)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45073 (BID)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42884 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
8366 (SREASON)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9 ()
CVE: CVE-2010-4072
CVE: CVE-2010-4072
Id:
CVE-2010-4072
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
Comment
: The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1 (CONFIRM)
[linux-kernel] 20101006 [PATCH] ipc: initialize structure memory to zero for shmctl (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648656 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45054 (BID)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
42778 (SECUNIA)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
ADV-2011-0012 (VUPEN)
42758 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
RHSA-2011:0017 (REDHAT)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
42884 (SECUNIA)
ADV-2011-0280 (VUPEN)
43161 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
USN-1057-1 (UBUNTU)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44 ()
CVE: CVE-2010-3881
CVE: CVE-2010-3881
Id:
CVE-2010-3881
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3881
Comment
: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[kvm] 20101030 [patch v2] x86: kvm: x86: fix information leak to userland (MLIST)
ADV-2010-3287 (VUPEN)
https://bugzilla.redhat.com/show_bug.cgi?id=649920 (CONFIRM)
[oss-security] 20101104 CVE request: kernel: kvm kernel stack leakage (MLIST)
[oss-security] 20101105 Re: CVE request: kernel: kvm kernel stack leakage (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
1024912 (SECTRACK)
RHSA-2010:0998 (REDHAT)
44666 (BID)
SUSE-SA:2011:004 (SUSE)
42932 (SECUNIA)
ADV-2011-0124 (VUPEN)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=virt/kvm/kvm.git%3Ba=commit%3Bh=831d9d02f9522e739825a51a11e3bc5aa531a905 (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97e69aa62f8b5d338d6cff49be09e37cc1262838 (MISC)
CVE: CVE-2010-3880
CVE: CVE-2010-3880
Id:
CVE-2010-3880
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3880
Comment
: net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
835 (Loop with Unreachable Exit Condition ('Infinite Loop'))
References:
[oss-security] 20101104 CVE request: kernel: logic error in INET_DIAG bytecode auditing (MLIST)
[netdev] 20101103 [PATCH 2/2] inet_diag: Make sure we actually run the same bytecode we audited. (MLIST)
44665 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=651264 (CONFIRM)
[oss-security] 20101105 Re: CVE request: kernel: logic error in INET_DIAG bytecode auditing (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
42126 (SECUNIA)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
DSA-2126 (DEBIAN)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860 (MISC)
CVE: CVE-2010-3877
CVE: CVE-2010-3877
Id:
CVE-2010-3877
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877
Comment
: The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=649717 (CONFIRM)
[netdev] 20101031 [PATCH 3/3] net: tipc: fix information leak to userland (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
[oss-security] 20101102 CVE request: kernel stack infoleaks (MLIST)
DSA-2126 (DEBIAN)
44630 (BID)
42884 (SECUNIA)
RHSA-2011:0017 (REDHAT)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-getname-info-disc(64578) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52 (MISC)
CVE: CVE-2010-3876
CVE: CVE-2010-3876
Id:
CVE-2010-3876
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876
Comment
: net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=649715 (CONFIRM)
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks (MLIST)
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks (MLIST)
[netdev] 20101031 [PATCH 2/3] net: packet: fix information leak to userland (MLIST)
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks (MLIST)
[oss-security] 20101102 CVE request: kernel stack infoleaks (MLIST)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
DSA-2126 (DEBIAN)
ADV-2011-0024 (VUPEN)
44630 (BID)
42789 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f (MISC)
CVE: CVE-2010-3875
CVE: CVE-2010-3875
Id:
CVE-2010-3875
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875
Comment
: The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=649713 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
[oss-security] 20101102 CVE request: kernel stack infoleaks (MLIST)
[netdev] 20101031 [PATCH 1/3] net: ax25: fix information leak to userland (MLIST)
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks (MLIST)
DSA-2126 (DEBIAN)
44630 (BID)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe10ae53384e48c51996941b7720ee16995cbcb7 (MISC)
CVE: CVE-2010-3874
CVE: CVE-2010-3874
Id:
CVE-2010-3874
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874
Comment
: Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
CVSSv2 Score:
4
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:C
CWE:
787 (Out-of-bounds Write)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=649695 (CONFIRM)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101104 Re: CVE request: kernel: CAN information leak (MLIST)
[netdev] 20101110 can-bcm: fix minor heap overflow (MLIST)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
[oss-security] 20101103 CVE request: kernel: CAN information leak (MLIST)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow (MLIST)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:002 (SUSE)
42801 (SECUNIA)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84 (MISC)
CVE: CVE-2010-3873
CVE: CVE-2010-3873
Id:
CVE-2010-3873
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
Comment
: The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
[oss-security] 20101104 Re: CVE request: X.25 remote DoS (MLIST)
[oss-security] 20101103 CVE request: X.25 remote DoS (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=649693 (CONFIRM)
[netdev] 20101102 [SECURITY] memory corruption in X.25 facilities parsing (MLIST)
[netdev] 20101104 Re: [SECURITY] memory corruption in X.25 facilities parsing (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
DSA-2126 (DEBIAN)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
openSUSE-SU-2013:0925 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6331d6f9a4298173b413cf99a40cc86a9d92c37 (MISC)
CVE: CVE-2010-3865
CVE: CVE-2010-3865
Id:
CVE-2010-3865
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3865
Comment
: Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
44549 (BID)
[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages() (MLIST)
[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages() (MLIST)
[netdev] 20101028 Re: [Security] TIPC security issues (MLIST)
[netdev] 20101028 Re: [Security] TIPC security issues (MLIST)
SUSE-SA:2010:057 (SUSE)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
RHSA-2011:0004 (REDHAT)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-rdsrdmapages-overflow(62881) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
CVE: CVE-2010-3861
CVE: CVE-2010-3861
Id:
CVE-2010-3861
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3861
Comment
: The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
44427 (BID)
[oss-security] 20101026 Re: CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=646725 (CONFIRM)
[oss-security] 20101025 CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL (MLIST)
SUSE-SA:2011:001 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:002 (SUSE)
ADV-2011-0012 (VUPEN)
42758 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
42801 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014 (MISC)
CVE: CVE-2010-3859
CVE: CVE-2010-3859
Id:
CVE-2010-3859
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859
Comment
: Multiple integer signedness errors in the TIPC implementation in the Linux kernel before 2.6.36.2 allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
787 (Out-of-bounds Write)
References:
[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size() (MLIST)
[netdev] 20101027 [PATCH 3/4] tipc: Update arguments to use size_t for iovec array sizes (MLIST)
[netdev] 20101027 [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size() (MLIST)
[netdev] 20101027 [PATCH 2/4] tipc: Fix bugs in tipc_msg_build() (MLIST)
[netdev] 20101027 [PATCH 4/4] tipc: Fix bugs in sending of large amounts of byte-stream data (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=645867 (CONFIRM)
[oss-security] 20101022 CVE request: kernel: heap overflow in TIPC (MLIST)
[netdev] 20101028 Re: [PATCH 2/4] tipc: Fix bugs in tipc_msg_build() (MLIST)
[netdev] 20101027 [PATCH 0/4] RFC: tipc int vs size_t fixes (MLIST)
[oss-security] 20101022 Re: CVE request: kernel: heap overflow in TIPC (MLIST)
RHSA-2011:0004 (REDHAT)
DSA-2126 (DEBIAN)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
44354 (BID)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
[netdev] 20101021 TIPC security issues (MLIST)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0 (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a (MISC)
CVE: CVE-2010-3858
CVE: CVE-2010-3858
Id:
CVE-2010-3858
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3858
Comment
: The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
44301 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=645222 (CONFIRM)
http://grsecurity.net/~spender/64bit_dos.c (MISC)
[oss-security] 20101022 Re: CVE request: kernel: setup_arg_pages: diagnose excessive argument size (MLIST)
15619 (EXPLOIT-DB)
[oss-security] 20101021 CVE request: kernel: setup_arg_pages: diagnose excessive argument size (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
RHSA-2010:0958 (REDHAT)
DSA-2126 (DEBIAN)
RHSA-2011:0004 (REDHAT)
42758 (SECUNIA)
MDVSA-2010:257 (MANDRIVA)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
42789 (SECUNIA)
ADV-2011-0024 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583 (MISC)
CVE: CVE-2010-3705
CVE: CVE-2010-3705
Id:
CVE-2010-3705
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705
Comment
: The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
CVSSv2 Score:
8.3
Access vector:
ADJACENT_NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
[oss-security] 20101004 Re: CVE request: kernel: SCTP memory corruption in HMAC handling (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=640036 (CONFIRM)
[linux-kernel] 20101001 [PATCH] Fix out-of-bounds reading in sctp_asoc_get_hmac() (MLIST)
[oss-security] 20101004 CVE request: kernel: SCTP memory corruption in HMAC handling (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
42745 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362 (MISC)
CVE: CVE-2010-3698
CVE: CVE-2010-3698
Id:
CVE-2010-3698
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698
Comment
: The KVM implementation in the Linux kernel before 2.6.36 does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT).
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=639879 (CONFIRM)
RHSA-2010:0842 (REDHAT)
44500 (BID)
ADV-2010-3123 (VUPEN)
RHSA-2010:0898 (REDHAT)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493 (MISC)
CVE: CVE-2010-3448
CVE: CVE-2010-3448
Id:
CVE-2010-3448
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3448
Comment
: drivers/platform/x86/thinkpad_acpi.c in the Linux kernel before 2.6.34 on ThinkPad devices, when the X.Org X server is used, does not properly restrict access to the video output control state, which allows local users to cause a denial of service (system hang) via a (1) read or (2) write operation.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=652122 (CONFIRM)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=565790 (CONFIRM)
[oss-security] 20100623 kernel: thinkpad-acpi: lock down video output state access (MLIST)
[oss-security] 20100928 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel (MLIST)
[oss-security] 20100930 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel (MLIST)
[oss-security] 20100929 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel (MLIST)
[oss-security] 20100930 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 (CONFIRM)
DSA-2126 (DEBIAN)
kernel-thinkpad-dos(64580) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b525c06cdbd8a3963f0173ccd23f9147d4c384b5 (MISC)
CVE: CVE-2010-3442
CVE: CVE-2010-3442
Id:
CVE-2010-3442
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442
Comment
: Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=638478 (CONFIRM)
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2 (CONFIRM)
42400 (SECUNIA)
RHSA-2010:0936 (REDHAT)
43787 (BID)
ADV-2010-3113 (VUPEN)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
42745 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
RHSA-2011:0004 (REDHAT)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
MDVSA-2010:257 (MANDRIVA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779 (MISC)
CVE: CVE-2010-3437
CVE: CVE-2010-3437
Id:
CVE-2010-3437
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
Comment
: Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
CVSSv2 Score:
6.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
43551 (BID)
http://jon.oberheide.org/files/cve-2010-3437.c (MISC)
15150 (EXPLOIT-DB)
[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check (MLIST)
[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=638085 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6 (CONFIRM)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:002 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29 (MISC)
CVE: CVE-2010-3432
CVE: CVE-2010-3432
Id:
CVE-2010-3432
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3432
Comment
: The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE:
20 (Improper Input Validation)
References:
43480 (BID)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=637675 (CONFIRM)
[oss-security] 20100924 CVE Request -- Linux/SCTP DoS in sctp_packet_config() (MLIST)
[netdev] 20100915 [PATCH] net: SCTP remote/local Denial of Service vulnerability description and fix (MLIST)
[oss-security] 20100925 Re: CVE Request -- Linux/SCTP DoS in sctp_packet_config() (MLIST)
RHSA-2010:0936 (REDHAT)
42400 (SECUNIA)
USN-1000-1 (UBUNTU)
ADV-2010-3113 (VUPEN)
RHSA-2010:0842 (REDHAT)
SUSE-SA:2011:001 (SUSE)
RHSA-2011:0004 (REDHAT)
RHSA-2010:0958 (REDHAT)
DSA-2126 (DEBIAN)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab (MISC)
CVE: CVE-2010-3310
CVE: CVE-2010-3310
Id:
CVE-2010-3310
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
Comment
: Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:P
CWE:
189 (Numeric Errors)
References:
43368 (BID)
41493 (SECUNIA)
[oss-security] 20100921 CVE request: kernel: Heap corruption in ROSE (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100923.bz2 (CONFIRM)
[oss-security] 20100921 Re: CVE request: kernel: Heap corruption in ROSE (MLIST)
68163 (OSVDB)
[linux-netdev] 20100920 [PATCH] rose: Fix signedness issues wrt. digi count. (MLIST)
SUSE-SA:2010:051 (SUSE)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
DSA-2126 (DEBIAN)
SUSE-SA:2010:060 (SUSE)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0298 (VUPEN)
43291 (SECUNIA)
MDVSA-2011:029 (MANDRIVA)
SUSE-SA:2010:054 (SUSE)
MDVSA-2011:051 (MANDRIVA)
kernel-rose-bind-dos(61953) (XF)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9828e6e6e3f19efcb476c567b9999891d051f52f (MISC)
CVE: CVE-2010-3298
CVE: CVE-2010-3298
Id:
CVE-2010-3298
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298
Comment
: The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20100914 CVE request: kernel: numerous infoleaks (MLIST)
41440 (SECUNIA)
[linux-kernel] 20100911 [PATCH] drivers/net/usb/hso.c: prevent reading uninitialized memory (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=633140 (CONFIRM)
[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks (MLIST)
SUSE-SA:2010:050 (SUSE)
USN-1041-1 (UBUNTU)
ADV-2011-0070 (VUPEN)
42758 (SECUNIA)
43226 (BID)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e (MISC)
CVE: CVE-2010-3297
CVE: CVE-2010-3297
Id:
CVE-2010-3297
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297
Comment
: The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5 (CONFIRM)
41440 (SECUNIA)
https://bugzilla.redhat.com/show_bug.cgi?id=633145 (CONFIRM)
[oss-security] 20100914 CVE request: kernel: numerous infoleaks (MLIST)
[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks (MLIST)
[linux-kernel] 20100911 [PATCH] drivers/net/eql.c: prevent reading uninitialized stack memory (MLIST)
43229 (BID)
RHSA-2010:0771 (REDHAT)
SUSE-SA:2010:050 (SUSE)
DSA-2126 (DEBIAN)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
42758 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43161 (SECUNIA)
ADV-2011-0280 (VUPEN)
USN-1057-1 (UBUNTU)
SUSE-SA:2010:052 (SUSE)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=44467187dc22fdd33a1a06ea0ba86ce20be3fe3c (MISC)
CVE: CVE-2010-3296
CVE: CVE-2010-3296
Id:
CVE-2010-3296
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296
Comment
: The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=633149 (CONFIRM)
[linux-kernel] 20100911 [PATCH] drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20100914 CVE request: kernel: numerous infoleaks (MLIST)
41440 (SECUNIA)
43221 (BID)
SUSE-SA:2010:050 (SUSE)
DSA-2126 (DEBIAN)
USN-1041-1 (UBUNTU)
42758 (SECUNIA)
ADV-2011-0070 (VUPEN)
42884 (SECUNIA)
RHSA-2011:0017 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2010:054 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de (MISC)
CVE: CVE-2010-3080
CVE: CVE-2010-3080
Id:
CVE-2010-3080
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080
Comment
: Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
415 (Double Free)
References:
[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=630551 (CONFIRM)
43062 (BID)
MDVSA-2010:198 (MANDRIVA)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:052 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27f7ad53829f79e799a253285318bff79ece15bd (MISC)
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=c598337660c21c0afaa9df5a65bb4a7a0cf15be8 (MISC)
CVE: CVE-2010-3079
CVE: CVE-2010-3079
Id:
CVE-2010-3079
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079
Comment
: kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=631623 (CONFIRM)
SUSE-SA:2010:050 (SUSE)
RHSA-2010:0842 (REDHAT)
43684 (BID)
ADV-2011-0070 (VUPEN)
42758 (SECUNIA)
USN-1041-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7 (MISC)
CVE: CVE-2010-3078
CVE: CVE-2010-3078
Id:
CVE-2010-3078
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078
Comment
: The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
41284 (SECUNIA)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4 (CONFIRM)
[xfs-masters] 20100906 [PATCH] xfs: prevent reading uninitialized stack memory (MLIST)
1024418 (SECTRACK)
43022 (BID)
[oss-security] 20100907 CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=630804 (CONFIRM)
[oss-security] 20100907 Re: CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak (MLIST)
SUSE-SA:2010:041 (SUSE)
41512 (SECUNIA)
ADV-2010-2430 (VUPEN)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
RHSA-2010:0839 (REDHAT)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:054 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a122eb2fdfd78b58c6dd992d6f4b1aaef667eef9 (MISC)
CVE: CVE-2010-3067
CVE: CVE-2010-3067
Id:
CVE-2010-3067
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
Comment
: Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=629441 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2 (CONFIRM)
RHSA-2010:0758 (REDHAT)
RHSA-2010:0779 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
42801 (SECUNIA)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
MDVSA-2010:257 (MANDRIVA)
RHSA-2010:0839 (REDHAT)
SUSE-SA:2010:060 (SUSE)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-doiosubmit-dos(61884) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478 (MISC)
CVE: CVE-2010-2963
CVE: CVE-2010-2963
Id:
CVE-2010-2963
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2963
Comment
: drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=642465 (CONFIRM)
http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/ (MISC)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
1024710 (SECTRACK)
44242 (BID)
SUSE-SA:2010:053 (SUSE)
USN-1000-1 (UBUNTU)
ADV-2010-3321 (VUPEN)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
DSA-2126 (DEBIAN)
SUSE-SA:2010:057 (SUSE)
MDVSA-2010:257 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e645d6b485446c54c6745c5e2cf5c528fe4deec ()
CVE: CVE-2010-2962
CVE: CVE-2010-2962
Id:
CVE-2010-2962
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962
Comment
: drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=637688 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
SUSE-SA:2010:051 (SUSE)
SUSE-SA:2010:050 (SUSE)
RHSA-2010:0842 (REDHAT)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
RHSA-2010:0958 (REDHAT)
42758 (SECUNIA)
44067 (BID)
USN-1041-1 (UBUNTU)
ADV-2011-0070 (VUPEN)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4 ()
CVE: CVE-2010-2960
CVE: CVE-2010-2960
Id:
CVE-2010-2960
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2960
Comment
: The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
476 (NULL Pointer Dereference)
References:
1024384 (SECTRACK)
42932 (BID)
[oss-security] 20100902 CVE-2010-2960 kernel: keyctl_session_to_parent null ptr deref (MLIST)
http://twitter.com/taviso/statuses/22777866582 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=627440 (CONFIRM)
41263 (SECUNIA)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
linux-kernel-keyctl-dos(61557) (XF)
CVE: CVE-2010-2955
CVE: CVE-2010-2955
Id:
CVE-2010-2955
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955
Comment
: The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
193 (Off-by-one Error)
References:
[linux-kernel] 20100830 Re: [PATCH] wireless extensions: fix kernel heap content leak (MLIST)
http://grsecurity.net/~spender/wireless-infoleak-fix2.patch (MISC)
[oss-security] 20100831 CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctl (MLIST)
[linux-kernel] 20100830 Re: [PATCH] wireless: fix 64K kernel heap content leak via ioctl (MLIST)
[linux-kernel] 20100827 [PATCH] wireless: fix 64K kernel heap content leak via ioctl (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2 (CONFIRM)
41245 (SECUNIA)
https://bugzilla.redhat.com/show_bug.cgi?id=628434 (CONFIRM)
[linux-kernel] 20100830 [PATCH] wireless extensions: fix kernel heap content leak (MLIST)
http://forums.grsecurity.net/viewtopic.php?f=3&t=2290 (MISC)
RHSA-2010:0771 (REDHAT)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
42885 (BID)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:054 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4 (MISC)
CVE: CVE-2010-2954
CVE: CVE-2010-2954
Id:
CVE-2010-2954
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954
Comment
: The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=628770 (CONFIRM)
[oss-security] 20100901 CVE-2010-2954 kernel: irda null ptr deref (MLIST)
http://twitter.com/taviso/statuses/22635752128 (MISC)
[netdev] 20100830 [PATCH] irda: Correctly clean up self->ias_obj on irda_bind() failure. (MLIST)
41234 (SECUNIA)
ADV-2010-2266 (VUPEN)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100901.bz2 (CONFIRM)
ADV-2010-2430 (VUPEN)
SUSE-SA:2010:041 (SUSE)
41512 (SECUNIA)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:052 (SUSE)
kernel-irdabind-dos(61522) (XF)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=628e300cccaa628d8fb92aa28cb7530a3d5f2257 (MISC)
CVE: CVE-2010-2943
CVE: CVE-2010-2943
Id:
CVE-2010-2943
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2943
Comment
: The xfs implementation in the Linux kernel before 2.6.35 does not look up inode allocation btrees before reading inode buffers, which allows remote authenticated users to read unlinked files, or read or overwrite disk blocks that are currently assigned to an active file but were previously assigned to an unlinked file, by accessing a stale NFS filehandle.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSSv3 Score:
8.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CWE:
200 (Information Exposure)
References:
[linux-xfs] 20100620 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup (MLIST)
[oss-security] 20100818 CVE request - kernel: xfs: stale data exposure (MLIST)
[linux-xfs] 20100620 [PATCH 0/4, V2] xfs: validate inode numbers in file handles correctly (MLIST)
[oss-security] 20100819 Re: CVE request - kernel: xfs: stale data exposure (MLIST)
42527 (BID)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35 (CONFIRM)
[linux-xfs] 20100620 [PATCH 4/4] xfs: remove block number from inode lookup code (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=624923 (CONFIRM)
[xfs] 20100618 Re: [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2 (MLIST)
[linux-xfs] 20100620 [PATCH 3/4] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (MLIST)
[xfs] 20100617 [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2 (MLIST)
RHSA-2010:0723 (REDHAT)
42758 (SECUNIA)
USN-1041-1 (UBUNTU)
ADV-2011-0070 (VUPEN)
43161 (SECUNIA)
USN-1057-1 (UBUNTU)
ADV-2011-0280 (VUPEN)
http://support.avaya.com/css/P8/documents/100113326 (CONFIRM)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188 (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa (MISC)
CVE: CVE-2010-3477
CVE: CVE-2010-3477
Id:
CVE-2010-3477
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3477
Comment
: The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
399 (Resource Management Errors)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4 (CONFIRM)
1024603 (SECTRACK)
RHSA-2010:0779 (REDHAT)
USN-1000-1 (UBUNTU)
DSA-2126 (DEBIAN)
RHSA-2010:0839 (REDHAT)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=0f04cfd098fb81fded74e78ea1a1b86cc6c6c31e ()
CVE: CVE-2010-2942
CVE: CVE-2010-2942
Id:
CVE-2010-2942
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942
Comment
: The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
[oss-security] 20100818 CVE request - kernel: net sched memleak (MLIST)
[oss-security] 20100819 Re: CVE request - kernel: net sched memleak (MLIST)
42529 (BID)
http://patchwork.ozlabs.org/patch/61857/ (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=624903 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc2 (CONFIRM)
41512 (SECUNIA)
ADV-2010-2430 (VUPEN)
SUSE-SA:2010:041 (SUSE)
RHSA-2010:0723 (REDHAT)
RHSA-2010:0771 (REDHAT)
RHSA-2010:0779 (REDHAT)
SUSE-SA:2010:040 (SUSE)
USN-1000-1 (UBUNTU)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:054 (SUSE)
http://support.avaya.com/css/P8/documents/100113326 (CONFIRM)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=1c40be12f7d8ca1d387510d39787b12e512a7ce8 (MISC)
CVE: CVE-2010-3084
CVE: CVE-2010-3084
Id:
CVE-2010-3084
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3084
Comment
: Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=632069 (CONFIRM)
43098 (BID)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4 (CONFIRM)
[oss-security] 20100909 CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL (MLIST)
[oss-security] 20100910 Re: CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL (MLIST)
[netdev] 20100907 [PATCH net-2.6] niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL (MLIST)
USN-1000-1 (UBUNTU)
RHSA-2010:0842 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee9c5cfad29c8a13199962614b9b16f1c4137ac9 (MISC)
CVE: CVE-2010-2478
CVE: CVE-2010-2478
Id:
CVE-2010-2478
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2478
Comment
: Integer overflow in the ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.33.7 on 32-bit platforms allows local users to cause a denial of service or possibly have unspecified other impact via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value that triggers a buffer overflow, a different vulnerability than CVE-2010-3084.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=608950 (CONFIRM)
[oss-security] 20100629 kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL (MLIST)
[oss-security] 20100630 Re: kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL (MLIST)
[oss-security] 20100629 Re: kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33.7 (CONFIRM)
41223 (BID)
[netdev] 20100628 [PATCH net-2.6 1/2] ethtool: Fix potential kernel buffer overflow in ETHTOOL_GRXCLSRLALL (MLIST)
SUSE-SA:2010:040 (SUSE)
USN-1000-1 (UBUNTU)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db048b69037e7fa6a7d9e95a1271a50dc08ae233 (MISC)
CVE: CVE-2010-3850
CVE: CVE-2010-3850
Id:
CVE-2010-3850
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850
Comment
: The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=644156 (CONFIRM)
[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET (MLIST)
20101207 Linux kernel exploit (FULLDISC)
USN-1023-1 (UBUNTU)
DSA-2126 (DEBIAN)
MDVSA-2010:257 (MANDRIVA)
43056 (SECUNIA)
SUSE-SA:2011:005 (SUSE)
ADV-2011-0213 (VUPEN)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=16c41745c7b92a243d0874f534c1655196c64b74 (MISC)
CVE: CVE-2010-3849
CVE: CVE-2010-3849
Id:
CVE-2010-3849
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3849
Comment
: The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
20101207 Linux kernel exploit (FULLDISC)
[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=644156 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
USN-1023-1 (UBUNTU)
DSA-2126 (DEBIAN)
MDVSA-2010:257 (MANDRIVA)
SUSE-SA:2011:005 (SUSE)
43056 (SECUNIA)
ADV-2011-0213 (VUPEN)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa0e846494792e722d817b9d3d625a4ef4896c96 (MISC)
CVE: CVE-2010-3848
CVE: CVE-2010-3848
Id:
CVE-2010-3848
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3848
Comment
: Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
787 (Out-of-bounds Write)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=644156 (CONFIRM)
USN-1023-1 (UBUNTU)
DSA-2126 (DEBIAN)
MDVSA-2010:257 (MANDRIVA)
ADV-2011-0213 (VUPEN)
43056 (SECUNIA)
SUSE-SA:2011:005 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:008 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a27e13d370415add3487949c60810e36069a23a6 (MISC)
CVE: CVE-2010-3904
CVE: CVE-2010-3904
Id:
CVE-2010-3904
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904
Comment
: The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
VU#362983 (CERT-VN)
http://www.vsecurity.com/resources/advisory/20101019-1/ (MISC)
1024613 (SECTRACK)
http://www.vsecurity.com/download/tools/linux-rds-exploit.c (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=642896 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
USN-1000-1 (UBUNTU)
RHSA-2010:0842 (REDHAT)
SUSE-SA:2010:053 (SUSE)
RHSA-2010:0792 (REDHAT)
SUSE-SA:2010:057 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
44677 (EXPLOIT-DB)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f ()
Content available only for registered users!
ovaldb@altx-soft.com